πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.8K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
β€Ό CVE-2021-43052 β€Ό

The Realm Server component of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition contains an easily exploitable vulnerability that allows authentication bypass due to a hard coded secret used in the default realm server of the affected system. Affected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.7.2 and below, TIBCO FTL - Developer Edition: versions 6.7.2 and below, and TIBCO FTL - Enterprise Edition: versions 6.7.2 and below.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43972 β€Ό

An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-1573 β€Ό

A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to improper input validation when parsing HTTPS requests. An attacker could exploit this vulnerability by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2021-43055 β€Ό

The eFTL Server component of TIBCO Software Inc.'s TIBCO eFTL - Community Edition, TIBCO eFTL - Developer Edition, and TIBCO eFTL - Enterprise Edition contains an easily exploitable vulnerability that allows clients to inherit the permissions of the client that initially connected on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO eFTL - Community Edition: versions 6.7.2 and below, TIBCO eFTL - Developer Edition: versions 6.7.2 and below, and TIBCO eFTL - Enterprise Edition: versions 6.7.2 and below.

πŸ“– Read

via "National Vulnerability Database".
β™ŸοΈ β€˜Wormable’ Flaw Leads January 2022 Patch Tuesday β™ŸοΈ

Microsoft today released updates to plug nearly 120 security holes in Windows and supported software. Six of the vulnerabilities were publicly detailed already, potentially giving attackers a head start in figuring out how to exploit them in unpatched systems. More concerning, Microsoft warns that one of the flaws fixed this month is "wormable," meaning no human interaction would be required for an attack to spread from one vulnerable Windows box to another.

πŸ“– Read

via "Krebs on Security".
πŸ•΄ Cloud Apps Replace Web as Source for Most Malware Downloads πŸ•΄

Two-thirds of all malware distributed to enterprise networks last year originated from cloud apps such as Google Drive, OneDrive, and numerous other cloud apps, new research shows.

πŸ“– Read

via "Dark Reading".
πŸ“’ FBI warns of hackers mailing malicious USB sticks to businesses πŸ“’

The FIN7 cyber crime group is alleged to be behind the months-long wave of attacks against the defence, transportation, and insurance industries

πŸ“– Read

via "ITPro".
β€Ό CVE-2022-21897 β€Ό

Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21916.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21842 β€Ό

Microsoft Word Remote Code Execution Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21902 β€Ό

Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21852, CVE-2022-21896.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21895 β€Ό

Windows User Profile Service Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21919.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21864 β€Ό

Windows UI Immersive Server API Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21912 β€Ό

DirectX Graphics Kernel Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21898.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21919 β€Ό

Windows User Profile Service Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21895.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21904 β€Ό

Windows GDI Information Disclosure Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21848 β€Ό

Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21883, CVE-2022-21889, CVE-2022-21890.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21873 β€Ό

Tile Data Repository Elevation of Privilege Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21913 β€Ό

Local Security Authority (Domain Policy) Remote Protocol Security Feature Bypass.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21839 β€Ό

Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21960 β€Ό

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963.

πŸ“– Read

via "National Vulnerability Database".
β€Ό CVE-2022-21962 β€Ό

Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21963.

πŸ“– Read

via "National Vulnerability Database".